1) The right to be left alone, and not be watched or tracked by others, is known as: a) Intellectual property b) Copyright c) Privacy d) Computer security 2) Which ethical principle supports the greatest happiness for the greatest number of people? a) The golden rule b) Risk aversion c) Utilitarianism d) The slippery slope rule 3) Tiny invisible graphics embedded in emails and web pages to monitor who is reading email messages or visiting web sites are called: a) Cookies b) Web beacons c) Snoopers d) Behavioral targeting 4) Why are intellectual property rights so difficult to protect in the digital age? a) Digital media is easy to transfer b) Digital media is easy to replicate c) Digital media is easy to alter d) All of these are true about digital intellectual property 5) Which of the following is considered as computer abuse rather than a computer crime? a) Information theft b) Spamming c) Unauthorised network access d) Copyright violation 6) When consumers agree to share private data with a company in an online transaction, based on their mutuality of interest, what core principles of Fair Information Practices can they expect from that company? a) Access to the company's database at any time & the right to delete their personal data b) Security of data & fines for any data breaches c) Clear explanation of information practices beforehand & choice over secondary uses of collected data d) Fair Information Practices do not apply to online shopping 7) What are web cookies? a) Online adverts which target people based on their data profiles b) Applications used to surf the Internet and look at web pages c) Malware which allows unauthorised data profiling of Internet users d) Small text files for personalisation stored on a computer hard drive when a website is visited 8) What do we call malware that locks down a device or network and demands payment before releasing it? a) Ransomware b) Spyware c) Web beacons d) Cookies 9) What do we call malware that infects a device by hiding within another programme such as a game? a) Viruses b) Spyware c) Trojans d) Ransomware 10) What is a distributed DoS attack? a) A hack into the Disc Operating System of a computer b) A coordinated overload of requests to a server using botnets to disrupt normal service c) A way of cracking difficult passwords d) None of these 11) The 'Stuxnet' virus is an example of: a) Anti-Malware software b) Ransomware c) Cyber warfare d) A code of conduct 12) Using two separate devices to check a log-in to a system, before allowing it, is called: a) Phishing b) Authentication c) Encryption d) Sniffing 13) A system for authenticating a person's identity based on physiological or behavioral characteristics is known as: a) Two-factor authentication b) Automatic character recognition c) Biometrics d) Biological scanning 14) What kind of software prevents unauthorised transfer of data by blocking ports and screening the data as it attempts to both enter or exit the network? a) A botnet b) Authentication software c) Spyware d) A firewall 15) A program that monitors information traveling over a network is called a(n): a) Spoofer b) Sniffer c) Evil twin d) Web bug

per en/la

Tauler de classificació

Estil visual

Opcions

Canvia de fonament

Restaurar desada automàtica: ?